On June 21, 2025, reports surfaced that China had dispatched two of its advanced electronic intelligence-gathering vessels from the People’s Liberation Army Navy (PLAN) to the Persian Gulf. This deployment occurred in the wake of Operation Midnight Hammer, a U.S. military campaign targeting Iranian nuclear infrastructure, and marks a notable escalation in regional military posturing. The move reinforces China’s intention to assert itself in one of the world’s most geopolitically sensitive regions.

Initial commentary suggested that Beijing’s objective was to bolster Iran’s defenses through intelligence sharing. However, emerging analysis indicates that China’s primary interest lies in observing and analyzing U.S. military conduct—particularly the use of stealth aircraft and electronic warfare technologies. The vessels, part of the Type 815A class and designated with hull numbers 855 and 815A, are specialized in capturing signals and monitoring radar activity, providing China with a valuable perspective on American tactical operations.

This development has captured the attention of defense circles and the wider public alike, reflecting the complex interaction of strategic ambition, technological rivalry, and geopolitical maneuvering in the Persian Gulf. China’s actions raise broader questions about its long-term goals and expanding role in a region central to the world’s energy economy.

Strategic Eavesdropping as a Global Norm

The practice of deploying intelligence assets to passively observe military activities is deeply embedded in global military strategy. During the Cold War, Soviet surveillance ships routinely followed U.S. fleets in the Atlantic, while American RC-135 reconnaissance planes gathered signals along Soviet peripheries in the Pacific.

In more recent times, Russian intelligence vessels loitered off Syria’s coast during Western strikes in 2018, collecting data on NATO’s operational methods. China has also pursued similar tactics, notably during the 2022 Rim of the Pacific (RIMPAC) exercises in the South China Sea.

By observing military maneuvers without directly engaging, nations can study adversarial capabilities, refine their own technologies, and prepare for potential conflict scenarios. Monitoring the operation of stealth aircraft, for example, offers critical insight into gaps in detection and air defense systems. China’s latest deployment fits neatly into this pattern—an effort to monitor the high-stakes execution of U.S. military force and extract lessons from it.

China’s Broader Strategic Goals

Beijing’s decision to send intelligence-gathering ships to the Persian Gulf is part of a calculated effort to further its geopolitical and military agenda. The immediate objective appears to be the study of Operation Midnight Hammer, particularly its use of stealth technology and electronic countermeasures.

The operation’s deployment of B-2 Spirit bombers and cutting-edge jamming systems presents a rare and valuable case study for China’s military analysts. On a broader level, China’s interest also stems from its reliance on oil imports from the Gulf, underscoring the region’s economic relevance to Beijing’s long-term planning.

In projecting naval power in such a strategically crucial area—near the Strait of Hormuz—China is asserting itself as a global actor with stakes in the stability and security of vital maritime routes. This move also aligns with its goal to improve space-based surveillance and anti-stealth capabilities, reinforcing its broader defense modernization strategy.

Technical Profile: The Type 815A Surveillance Vessels

Central to China’s intelligence operation are the Type 815A-class ships, equipped with cutting-edge sensors designed to intercept a range of electromagnetic emissions, including radar signals and military communications.

These ships can detect and track aircraft—such as the B-2 Spirit—by analyzing auxiliary electronic signatures, including those from refueling tankers or escort planes. They also integrate seamlessly with satellite systems, transmitting data for near real-time analysis and boosting China’s strategic situational awareness.

The 815A platforms combine improved detection sensitivity with rapid data processing, allowing for detailed assessments of adversary tactics. Their ability to incorporate cyber elements and potentially disrupt communications makes them formidable assets in the realm of modern naval intelligence.

Inside Operation Midnight Hammer

The U.S. operation that sparked global attention—Operation Midnight Hammer—unfolded on June 21, 2025. It targeted Iran’s nuclear facilities at Fordo, Natanz, and Isfahan using seven B-2 stealth bombers, each armed with 30,000-pound GBU-57 bunker-buster munitions.

According to General Dan Caine, Chairman of the Joint Chiefs of Staff, the mission involved 125 coordinated aircraft, including decoys and escorts, designed to overload Iranian air defenses. A U.S. Navy submarine contributed by launching dozens of Tomahawk missiles at Isfahan’s defensive infrastructure ahead of the main airstrikes.

The operation employed advanced jamming technologies to blind radar systems and create false flight paths, allowing the stealth bombers to slip through undetected. The precision and synchronization of these tactics offered China a valuable opportunity to observe how the U.S. deploys stealth and deception under real-world conditions.

Wider International Interest and Reactions

Operation Midnight Hammer has drawn global scrutiny. Russian military analysts are likely evaluating the GBU-57’s deployment patterns and impact depth to inform their own weapons development. Simultaneously, regional actors such as Saudi Arabia and the UAE view China’s naval presence with caution, aware of its implications for Gulf security and regional power balances.

European allies, concerned about escalation risks, are increasingly attentive to China’s expanding surveillance activities. There is also speculation that Russia and China could exchange data and strategic insights, particularly under frameworks such as their Maritime Security Belt joint exercises.

This heightened interest reflects the operation’s ripple effects on global defense postures, with nations reassessing alliances, capabilities, and potential threats in a rapidly shifting security environment.

U.S. Counterintelligence and Operational Security Measures

Aware of potential surveillance by adversaries, the U.S. military employed a variety of countermeasures during the operation. These included decoy aircraft and misdirection strategies to mask the B-2 bombers’ actual flight paths, along with fighter escorts clearing the skies ahead of their arrival.

The U.S. also took precautions in the Strait of Hormuz, deploying minesweepers and dispersing naval forces to reduce vulnerability to Iranian attacks. Communications between assets were safeguarded using encrypted, frequency-hopping systems, reducing the risk of interception by Chinese intelligence ships.

These efforts are part of a broader doctrine aimed at preserving operational secrecy and maintaining a technological edge. They underscore the challenges of modern warfare, where concealing strategic intentions is as critical as the precision of the attack itself.

Looking Ahead: Global Repercussions and Strategic Outlook

China’s intelligence foray into the Persian Gulf is more than a tactical move—it’s a strategic signal. It has heightened tensions with Washington and introduced new uncertainties for regional powers. Iran may benefit from Chinese surveillance, but at the cost of increased scrutiny and possible backlash from neighboring countries.

There is growing concern that China could pursue a more permanent military presence in the region, a scenario flagged in recent Pentagon assessments. In response, the U.S. may intensify its use of deceptive technologies and further secure its communications infrastructure.

Russia’s keen interest in the operation and potential collaboration with China complicate the Western security calculus. With insights from the mission, China may accelerate its efforts to neutralize stealth threats, closing the gap in its technological capabilities.

Ultimately, this episode signals a shift in global military dynamics—where intelligence, deterrence, and indirect engagement shape the contours of modern power struggles. As major powers maneuver for advantage, understanding the interplay of these forces becomes essential for policymakers and citizens alike.